期刊文献+
共找到407篇文章
< 1 2 21 >
每页显示 20 50 100
Improved key exchange protocol for three-party based on verifier authentication 被引量:3
1
作者 柳秀梅 周福才 常桂然 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期322-324,共3页
To prevent server compromise attack and password guessing attacks,an improved and efficient verifier-based key exchange protocol for three-party is proposed,which enables two clients to agree on a common session key w... To prevent server compromise attack and password guessing attacks,an improved and efficient verifier-based key exchange protocol for three-party is proposed,which enables two clients to agree on a common session key with the help of the server.In this protocol,the client stores a plaintext version of the password,while the server stores a verifier for the password.And the protocol uses verifiers to authenticate between clients and the server.The security analysis and performance comparison of the proposed protocol shows that the protocol can resist many familiar attacks including password guessing attacks,server compromise attacks,man-in-the-middle attacks and Denning-Sacco attacks,and it is more efficient. 展开更多
关键词 key exchange for three-party password-based authentication verifier
下载PDF
An Identity-Based Strong Designated Verifier Proxy Signature Scheme 被引量:3
2
作者 WANG Qin CAO Zhenfu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1633-1635,共3页
In a strong designated verifier proxy signature scheme, a proxy signer can generate proxy signature on behalf of an original signer, but only the designated verifier can verify the validity of the proxy signature. In ... In a strong designated verifier proxy signature scheme, a proxy signer can generate proxy signature on behalf of an original signer, but only the designated verifier can verify the validity of the proxy signature. In this paper, we first define the security requirements for strong designated verifier proxy signature schemes. And then we construct an identity-based strong designated verifier proxy signature scheme. We argue that the proposed scheme satisfies all of the security requirements. 展开更多
关键词 strong designated verifier signature proxy signature identity-based cryptosystem bilinear pairing
下载PDF
Threshold Subliminal Channel Based on Designated Verifier Signature 被引量:1
3
作者 SU Li CUI Guohua YANG Muxiang CHEN Jing 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1485-1488,共4页
The subliminal channel is used to send a secret message to an authorized receiver; the message cannot he discovered by any unauthorized receivers. Designated verifier signature (DVS) provide authentication of a mess... The subliminal channel is used to send a secret message to an authorized receiver; the message cannot he discovered by any unauthorized receivers. Designated verifier signature (DVS) provide authentication of a message, we design a DVS scheme with message recovery mechanism and use it as a subliminal channel. In order to share a message among n users securely and allows t or more users can reconstruct the secret in dynamic groups, we combine both subliminal channel and (t, n) threshold cryptography. Then we proposed a threshold subliminal channel which can convey a subliminal message to a group of users based on message-recovery designated verifier signatures. Reconstructing the subliminal message relies on the cooperation of t or more users in the group and they can verify the validity of the subliminal message. Security and performance analysis show that the proposed scheme is secure and efficient. 展开更多
关键词 THRESHOLD subliminal channel designated verifier signature digital signature
下载PDF
Verifier提高验证完备性
4
作者 林慧 蒋武 +2 位作者 熊熙 李元祝 黄志荣 《电子技术应用》 北大核心 2016年第8期37-40,43,共5页
随着集成电路设计技术的不断发展,电路设计中经常出现一些问题。因此,设计验证技术成为了电路设计中不可或缺的部分。如何提高验证完备性,是验证技术的难题之一。本文介绍了Cadence最新发布的适用于模拟设计的ADE Verifier的工具使用流... 随着集成电路设计技术的不断发展,电路设计中经常出现一些问题。因此,设计验证技术成为了电路设计中不可或缺的部分。如何提高验证完备性,是验证技术的难题之一。本文介绍了Cadence最新发布的适用于模拟设计的ADE Verifier的工具使用流程,以及根据海思业务需求定制的使用方法。该工具整合了验证工具ADE Explorer和ADE Assembler的特性,完善了模拟电路设计验证流程,解决了模拟设计验证完备性中的问题。 展开更多
关键词 电路设计 验证完备性 ADE verifier
下载PDF
A Two-Party Password-Authenticated Key Exchange Protocol with Verifier
5
作者 Shunbo Xiang Bing Xu Ke Chen 《Journal of Computer and Communications》 2021年第4期102-109,共8页
To tackle with the security lack in the password-authenticated key exchange protocol, this paper proposes a two-party password-authenticated key exchange protocol based on a verifier. In the proposed protocol, a user ... To tackle with the security lack in the password-authenticated key exchange protocol, this paper proposes a two-party password-authenticated key exchange protocol based on a verifier. In the proposed protocol, a user stores his password in plaintext, and the server stores a verifier for the user’s password, using DL difficult problem and DH difficult problem, through the session between user and server to establish a session key. The security discussion result shows that the proposed protocol provides forward secrecy, and can effectively defend against server compromising fake attacks, dictionary attacks and middleman attacks. Protocol efficiency comparisons reveal our protocol is more reasonable. 展开更多
关键词 verifier Password-Authenticated Key Exchange Fake Attack Dictionary Attack Session Key
下载PDF
ADE Verifier在项目移植、管理和验证中的应用
6
作者 蒋佳君 黄志荣 +1 位作者 吕波 孙金铎 《中国集成电路》 2019年第1期47-56,共10页
ADE Verifier是Cadence New ADE家庭成员中的重要一员,它主要用于项目管理和验证。Verifier主要功能;(1)可以在I C设计项目中统一管理仿真case与指标对应关系,手动/自动刷新ADE的最新仿真结果并显示其指标通过情况;(2)还可以通过一键完... ADE Verifier是Cadence New ADE家庭成员中的重要一员,它主要用于项目管理和验证。Verifier主要功能;(1)可以在I C设计项目中统一管理仿真case与指标对应关系,手动/自动刷新ADE的最新仿真结果并显示其指标通过情况;(2)还可以通过一键完成项目所有仿真并以简明的界面给出仿真结果和spec达成与否等信息。(3)其流程具有高的统筹性,高效性,操作简单等优点。同时该流程能够提高项目设计规范性,仿真完备性,从而提高芯片设计成功率。本文针对海思公司一个实际ADC项目验证了Verifier flow,在整个流程中可以直观清晰查看整个项目各指标状态和达成情况;结合Matlab在New ADE的集成功能,调用Mat l ab计算的结果也可以直接在ADE和Verifier中显示,基本达到了一键完成所有仿真,大大降低了项目换代,项目管理和项目验证而投入的人力成本。 展开更多
关键词 verifier VIRTUOSO NewADE MatlabIntegration IC 项目移植 项目管理 项目验证
下载PDF
INCISIVE FORMAL VERIFIER
7
《中国集成电路》 2007年第3期76-79,共4页
Incisive Formal Verifier为您的工作平台带来了形式分析的强大性能,能够令生产力大幅提高,并提升设计质量。作为Incisive平台的全套断言式验证解决方案的一个关键组件,Incisive Formal Verifier让你能够提前几个月开始验证,降低了... Incisive Formal Verifier为您的工作平台带来了形式分析的强大性能,能够令生产力大幅提高,并提升设计质量。作为Incisive平台的全套断言式验证解决方案的一个关键组件,Incisive Formal Verifier让你能够提前几个月开始验证,降低了重新投片的风险,加快了上市时间。 展开更多
关键词 Incisive FORMAL verifier 设计质量 纳米级IC 计算机技术
下载PDF
Certificateless universal designated verifier signature schemes 被引量:8
8
作者 MING Yang SHEN Xiao-qin WANG Yu-min 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2007年第3期85-90,94,共7页
Universal designated verifier signature schemes allows a signature holder to designate the signature to a desire designated verifier, in such a way that only designated verifier can verify this signature, but is unabl... Universal designated verifier signature schemes allows a signature holder to designate the signature to a desire designated verifier, in such a way that only designated verifier can verify this signature, but is unable to convince anyone else of this fact. The previous constructions of universal designated verifier signature rely on the underlying public key infrastructure, that needs both signers and verifiers to verify the authenticity of the public keys, and hence, the certificates are required. This article presents the first model and construction of the certificateless universal designated verifier signature scheme, in which the certificates are not needed. The proposed scheme satisfies all the requirements of the universal designated verifier signature in the certificateless system. Security proofs are provided for the scheme based on the random oracle model, assuming that the Bilinear diffie-hellman (BDH) problem is hard to solve. 展开更多
关键词 certificateless cryptography universal designated verifier signature bilinear pairing
原文传递
Cloud data auditing with designated verifier 被引量:4
9
作者 Solomon Guadie WORKU Chunxiang XU Jining ZHAO 《Frontiers of Computer Science》 SCIE EI CSCD 2014年第3期503-512,共10页
An auditing scheme is a good way to prove owner's data outsourced to the cloud are kept intact, and a scheme capable of giving public verifiability service is a good option that some researchers have managed to build... An auditing scheme is a good way to prove owner's data outsourced to the cloud are kept intact, and a scheme capable of giving public verifiability service is a good option that some researchers have managed to build for the last few years. However, in a public auditing scheme everybody does verification of data and a possibility of leaking some secrete information to the public verifiers is an issue that data owners are unhappy with this scenario. For example, the data owner does not want anybody else to know he has the data stored in the cloud server. Motivated by the issue of privacy associated with public auditing system, we proposed a designated verifier auditing (DVA) scheme based on Steinfeld et al.'s universal designated verifier (DV) signature scheme. Our DVA scheme authorizes a third party auditor with private verification capability. It provides private verification because the scheme involves private key of the verifier. Moreover, we present the batch auditing scheme to improve auditing efficiency. Through rigorous security analysis we showed that our scheme is provably secure in the random oracle model assuming that the computational Diffie-Hellman (CDH) problem is hard over the group of bilinear maps. 展开更多
关键词 cloud data storage designated verifier data privacy storage correctness cloud computing
原文传递
Universal Designated Multi Verifier Signature Scheme without Random Oracles 被引量:1
10
作者 MING Yang WANG Yumin 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期685-691,共7页
In this paper, we re-formalize the security notions of universal designated multi verifier signature (UDMVS) schemes. Then the first UDMVS scheme is presented in the standard model (i.e. without random oracles) ba... In this paper, we re-formalize the security notions of universal designated multi verifier signature (UDMVS) schemes. Then the first UDMVS scheme is presented in the standard model (i.e. without random oracles) based on Waters' signature scheme. In this setting, a signature holder can to designate the signature to multi verifiers. Moreover, the security of our proposed scheme is based on the Gap Bilinear Difffie-Hellman assumption. 展开更多
关键词 universal designated multi verifier signature random oracle bilinear pairing
原文传递
HDL Coder和HDL Verifier支持HDL代码生成和验证 被引量:8
11
作者 张慧娟 《电子设计技术 EDN CHINA》 2012年第5期20-21,共2页
日前,MathWorkS宣布推出HDLCoder,它支持从MATLAB代码自动生成HDL代码,允许工程师用MATLAB语言实现FPGA和ASIC设计。同时发布的还有HDLVerifier,该产品包含用于测试的FPGA硬件在环功能。这两款产品使得MathWorks可提供利用MATLAB和S... 日前,MathWorkS宣布推出HDLCoder,它支持从MATLAB代码自动生成HDL代码,允许工程师用MATLAB语言实现FPGA和ASIC设计。同时发布的还有HDLVerifier,该产品包含用于测试的FPGA硬件在环功能。这两款产品使得MathWorks可提供利用MATLAB和Simulink进行HDL代码生成和验证的能力。 展开更多
关键词 HDL CODER HDL verifier MATLAB SIMULINK FPGA MATHWORKS
原文传递
A short non-delegatable strong designated verifier signature
12
作者 Haibo TIAN Jin LI 《Frontiers of Computer Science》 SCIE EI CSCD 2014年第3期490-502,共13页
A non-delegatable strong designated verifier signature (NSDVS) enforces verification of a signature by a designated verifier only. The concept is useful in various commercial cryptographic applications such as copyr... A non-delegatable strong designated verifier signature (NSDVS) enforces verification of a signature by a designated verifier only. The concept is useful in various commercial cryptographic applications such as copyright protection, e-voting, and e-libraries. This paper reports the shortest NSDVS so far that consists of only two elements. The scheme is inspired by an identification scheme and Cramer et al.'s OR-proof technique where a prover can prove that he knows at least one out two secrets. It is solidified by a symmetric key based group to group encryption algorithm. Two implementations of the algorithm are reported. The scheme is provably secure with respect to its properties of unforgeability, non-transferability, privacy of signer's identity, and non-delegatability. 展开更多
关键词 designated verifier signature non-delegatability symmetric encryption
原文传递
A strong multi-designated verifiers signature scheme
13
作者 Bo YANG Zibi XIAO +2 位作者 Yixian YANG Zhengming HU Xinxin NIU 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2008年第2期167-170,共4页
Based on Chameleon Hash and D.Boneh’s one round multi-party key agreement protocol,this paper proposes a multi-designated verifiers signature scheme.In this scheme only the verifiers designated by the signer can inde... Based on Chameleon Hash and D.Boneh’s one round multi-party key agreement protocol,this paper proposes a multi-designated verifiers signature scheme.In this scheme only the verifiers designated by the signer can independently verify the signature.And no one else other than the designated person can be convinced by this signature even if one of the designated verifiers reveals the secret value.The analysis of the proposed scheme shows that it satisfies non-transferability,unforgeability and privacy of the signer’s identity and has to low computational cost. 展开更多
关键词 multi-designated verifiers signature multi-linear map privacy of signer’s identity
原文传递
DNATyper^(TM)21与Verifiler^(TM)Plus试剂盒对常规案件检材检验的比较
14
作者 王剑 马云龙 +4 位作者 余政梁 龚政 高馨玉 杨亮 张丽娜 《刑事技术》 2024年第3期318-322,共5页
本文通过比较DNATyper^(TM)21与Verifi ler^(TM)Plus两种STR检测试剂盒对各类案件检材的检验能力,探讨DNATyper^(TM)21试剂盒在常规案件检验中应用的可靠性。取0.03125、0.0625、0.125、0.25、0.5、1.0 ng/μL基因组标准品对两种试剂盒... 本文通过比较DNATyper^(TM)21与Verifi ler^(TM)Plus两种STR检测试剂盒对各类案件检材的检验能力,探讨DNATyper^(TM)21试剂盒在常规案件检验中应用的可靠性。取0.03125、0.0625、0.125、0.25、0.5、1.0 ng/μL基因组标准品对两种试剂盒进行灵敏度测试;应用DNATyper^(TM)21与Verifi ler^(TM)Plus试剂盒分别对1056例常规案件检材DNA进行检验;对同一样本等位基因进行一致性比较。结果表明,两种试剂盒均可以成功检测出模板浓度在0.0625 ng/μL以上的标准DNA。在检验的1056例样本中,DNATyper^(TM)21试剂盒共检出881例,检出率为83.4%;Verifi ler^(TM)Plus试剂盒检出892例,检出率为84.5%。统计学结果表明两种试剂盒检出率无统计学差异,且同一样本相同基因座得到的等位基因分型一致。综上,DNATyper^(TM)21试剂盒对各类常规检材具有良好的检验能力,可应用于日常案件检验。 展开更多
关键词 法医物证学 DNATyper^(TM)21试剂盒 Verifi ler^(TM)Plus试剂盒 比较研究 生物检材
下载PDF
Establishment and validation of a predictive model for peripherally inserted central catheter-related thrombosis in patients with liver cancer 被引量:1
15
作者 Xiao-Fei Chen Hao-Jun Wu +3 位作者 Tang Li Jia-Bin Liu Wen-Jie Zhou Qiang Guo 《World Journal of Gastrointestinal Surgery》 SCIE 2024年第7期2221-2231,共11页
BACKGROUND Peripherally inserted central catheters(PICCs)are commonly used in hospitalized patients with liver cancer for the administration of chemotherapy,nutrition,and other medications.However,PICC-related thrombo... BACKGROUND Peripherally inserted central catheters(PICCs)are commonly used in hospitalized patients with liver cancer for the administration of chemotherapy,nutrition,and other medications.However,PICC-related thrombosis is a serious complication that can lead to morbidity and mortality in this patient population.Several risk factors have been identified for the development of PICC-related thrombosis,including cancer type,stage,comorbidities,and catheter characteristics.Understanding these risk factors and developing a predictive model can help healthcare providers identify high-risk patients and implement preventive measures to reduce the incidence of thrombosis.AIM To analyze the influencing factors of PICC-related thrombosis in hospitalized patients with liver cancer,construct a predictive model,and validate it.METHODS Clinical data of hospitalized patients with liver cancer admitted from January 2020 to December 2023 were collected.Thirty-five cases of PICC-related thrombosis in hospitalized patients with liver cancer were collected,and 220 patients who underwent PICC placement during the same period but did not develop PICC-related thrombosis were randomly selected as controls.A total of 255 samples were collected and used as the training set,and 77 cases were collected as the validation set in a 7:3 ratio.General patient information,case data,catheterization data,coagulation indicators,and Autar Thrombosis Risk Assessment Scale scores were analyzed.Univariate and multivariate unconditional logistic regression analyses were performed on relevant factors,and the value of combined indicators in predicting PICC-related thrombosis in hospitalized patients with liver cancer was evaluated using receiver operating characteristic(ROC)curve analysis.RESULTS Univariate analysis showed statistically significant differences(P<0.05)in age,sex,Karnofsky performance status score(KPS),bedridden time,activities of daily living impairment,parenteral nutrition,catheter duration,distant metastasis,and bone marrow suppression between the thrombosis group and the non-thrombosis group.Other aspects had no statistically significant differences(P>0.05).Multivariate regression analysis showed that age≥60 years,KPS score≤50 points,parenteral nutrition,stage III to IV,distant metastasis,bone marrow suppression,and activities of daily living impairment were independent risk factors for PICC-related thrombosis in hospitalized patients with liver cancer(P<0.05).Catheter duration of 1-6 months and catheter duration>6 months were protective factors for PICC-related thrombosis(P<0.05).The predictive model for PICC-related thrombosis was obtained as follows:P predictive probability=[exp(Logit P)]/[1+exp(Logit P)],where Logit P=age×1.907+KPS score×2.045+parenteral nutrition×9.467+catheter duration×0.506+tumor-node-metastasis(TNM)staging×2.844+distant metastasis×2.065+bone marrow suppression×2.082+activities of daily living impairment×13.926.ROC curve analysis showed an area under the curve(AUC)of 0.827(95%CI:0.724-0.929,P<0.001),with a corresponding optimal cut-off value of 0.612,sensitivity of 0.755,and specificity of 0.857.Calibration curve analysis showed good consistency between the predicted occurrence of PICC-related thrombosis and actual occurrence(P>0.05).ROC analysis showed AUCs of 0.888 and 0.729 for the training and validation sets,respectively.CONCLUSION Age,KPS score,parenteral nutrition,TNM staging,distant metastasis,bone marrow suppression,and activities of daily living impairment are independent risk factors for PICC-related thrombosis in hospitalized patients with liver cancer,while catheter duration is a protective factor for the disease.The predictive model has an AUC of 0.827,indicating high predictive accuracy and clinical value. 展开更多
关键词 Liver cancer Peripherally inserted central catheters THROMBOSIS Model Verify
下载PDF
A Composite Ansatz for Calculation of Dynamical Structure Factor
16
作者 张玉佩 莫崇杰 +1 位作者 张平 康炜 《Chinese Physics Letters》 SCIE EI CAS CSCD 2024年第1期92-103,共12页
We propose an ansatz without adjustable parameters for the calculation of a dynamical structure factor.The ansatz combines the quasi-particle Green’s function,especially the contribution from the renormalization fact... We propose an ansatz without adjustable parameters for the calculation of a dynamical structure factor.The ansatz combines the quasi-particle Green’s function,especially the contribution from the renormalization factor,and the exchange-correlation kernel from time-dependent density functional theory together,verified for typical metals and semiconductors from a plasmon excitation regime to the Compton scattering regime.It has the capability to reconcile both small-angle and large-angle inelastic x-ray scattering(IXS)signals with muchimproved accuracy,which can be used as the theoretical base model,in inversely inferring electronic structures of condensed matter from IXS experimental signals directly.It may also be used to diagnose thermal parameters,such as temperature and density,of dense plasmas in x-ray Thomson scattering experiments. 展开更多
关键词 EXCITATION INVERSE verified
下载PDF
A verifiable essential secret image sharing scheme based on HLRs(VESIS-(t,s,k,n))
17
作者 Massoud Hadian Dehkordi Seyed Taghi Farahi Samaneh Mashhadi 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第2期388-410,共23页
In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to u... In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to use essential secret image sharing schemes.In this article,a verifiable essential secret image sharing scheme based on HLRs is proposed.Shareholder's share consists of two parts.The first part is produced by the shareholders,which prevents the fraud of dealers.The second part is a shadow image that is produced by using HLRs and the first part of share.The verification of the first part of the shares is done for the first time by using multilinear and bilinear maps.Also,for verifying shadow images,Bloom Filters are used for the first time.The proposed scheme is more efficient than similar schemes,and for the first part of the shares,has formal security. 展开更多
关键词 Bloom Filter CRYPTOGRAPHY Essential Secret Image Sharing Verifiability
下载PDF
P_(c)(4457)Interpreted as a J^(P)=1/2+State by D^(0)∧_(c)^(+)(2595)-π^(0)P_(c)(4312) Interaction
18
作者 Jin-Zi Wu Jin-Yi Pang Jia-Jun Wu 《Chinese Physics Letters》 SCIE EI CAS CSCD 2024年第9期23-27,共5页
P_(c)(4457)has been discovered over five years,but the parity of this particle remains undetermined.We propose a new interpretation for P_(c)(4457),which is the state generated from the coupled-channel D^(0)Ac+(2595)... P_(c)(4457)has been discovered over five years,but the parity of this particle remains undetermined.We propose a new interpretation for P_(c)(4457),which is the state generated from the coupled-channel D^(0)Ac+(2595)andπ^(0)P_(c)(4312)since they can exchange an almost on-shell∑_(c)^(+).In this scenario,the parity of P_(c)(4457)will be positive,which is different from the candidate of the bound state of D*∑_(c).The main decay channel of P_(c)(4457)in this model is Pc(4312)π.We propose three processes∧_(b)^(0)→J/ψKapπ^(-),∧_(b)^(0)→J/ψK-pπ^(0),and∧_(b)^(0)→J/ψpπ^(-)π^(+)k^(-)to verify Pc(4457)→Pc(4312)π. 展开更多
关键词 PARITY verify
下载PDF
基于模型的FADEC软件结构覆盖率分析 被引量:2
19
作者 赵飞 张杰 《航空计算技术》 2017年第2期93-96,共4页
结构覆盖率分析是基于需求测试的补充和完善,能够发现软件中是否存在预期外的功能。在基于模型的软件开发过程中,模型覆盖率代替了传统的代码覆盖率,运用模型检查技术自动生成测试用例是形式化方法在模型覆盖率测试中的主要途径,涵盖了... 结构覆盖率分析是基于需求测试的补充和完善,能够发现软件中是否存在预期外的功能。在基于模型的软件开发过程中,模型覆盖率代替了传统的代码覆盖率,运用模型检查技术自动生成测试用例是形式化方法在模型覆盖率测试中的主要途径,涵盖了判定覆盖(DC)、条件覆盖(CC)、修改条件/判定覆盖(MC/DC)等多种方式。以航空发动机FADEC软件开发过程中的一个实际案例为例,结合Simulink Design Verifier分析验证工具,检验其生成的用例对模型的覆盖率,表明方法的实用性。 展开更多
关键词 DO-178C 覆盖率分析 MC/DC SIMULINK Design verifier工具 FADEC软件
下载PDF
Two t-out-of-n Oblivious Transfer Schemes with Designated Receiver
20
作者 ZHANG Jianhong ZOU Wei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1903-1906,共4页
Oblivious transfer (OT) protocol is a fundamental cryptographical tool and widely used as a building block of secure computation. In this work, we propose two efficient t-out-of-n oblivious transfer schemes with the... Oblivious transfer (OT) protocol is a fundamental cryptographical tool and widely used as a building block of secure computation. In this work, we propose two efficient t-out-of-n oblivious transfer schemes with the designated receiver. A common advantage of the two schemes is efficient. The total computation cost of the sender and the receiver is n + 2t + 1 modular exponentiations in first scheme that is three-round, and the total one of the sender and receiver is n + 3t modular exponentiations in second scheme that is two-round. Another advantage of both schemes is designable. 展开更多
关键词 oblivious transfer designated verifier EFFICIENCY
下载PDF
上一页 1 2 21 下一页 到第
使用帮助 返回顶部